Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5905758ybp; Tue, 8 Oct 2019 09:59:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqwIKKxJ6uH7ozWOKmm5ICX4NFo0IyPRhYyMbba42NMeQASRSE7C1NCNLtKUlvjgJQ0/Dpmz X-Received: by 2002:aa7:d508:: with SMTP id y8mr34716204edq.171.1570553957384; Tue, 08 Oct 2019 09:59:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570553957; cv=none; d=google.com; s=arc-20160816; b=y2knZtcdAxFPjgpKtEmAyZle+8vkGT3qHJIIcFeJQThtKIbn6KukT7sq2y1VEVNIs+ epDq5vyhggudRpXkxVspL4bXMBKI4HBc8i1VM4YLPdQbYOlUip+wodp16YOFvzF/X92c CmxMWrO3OTn9zSoIqVzItpGN7e4fGx+lS4rmgcu1VjuAz/vPi1UeJnGolOJTnCcgtaJQ NzD9ss1BwkcNYJHE4UdJwne5VxNunfLO6xtQcSS/fj/v3OH/Ce+fDud7ScK63n2qkXct wYaZ69USp5eoAsE7q8V29mCNx1H3Fo0AiiYEi6nUThdE2gEmvMwyqx5yE1Ybty3meyBr lUUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=ObMlVjqPB36ptcoFRcasOGd3zK5736mgqCU3NjhTM6I=; b=1CriTzhULXOcV4TzKk+M2oD9p80mgwD37viOWabQPyYum/FWFS2n9e3Ffo5Ry7VMkp wfuMZhO2zOgA1DoZQeBmXKVpTBmnurcDzwZCsDTu0yCOOn/UZ1vhp3pEQ0R9Lp3e2ET5 bX3Z1xFwL403HC3+5uyxLGVWfE6J0X/V8YeOpPJj3r1Ie7EbCv2ydyZ9yz+T+WsGZDEP TY74XiqPv3CXf5kPmcru619a9ZXlSdw8h16xklYGtPhUD6Aoe7T55WjR3ONYpt4SV336 d0gT+VhvgMBFpfzWsVQ6ICXrxrbyGJ92gezQFvZEQOrhUOoFwgM2IA3Bo7sRSwyY38bD sfgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id sb7si9355548ejb.321.2019.10.08.09.58.53; Tue, 08 Oct 2019 09:59:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726320AbfJHQ6c (ORCPT + 99 others); Tue, 8 Oct 2019 12:58:32 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:28171 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725900AbfJHQ6b (ORCPT ); Tue, 8 Oct 2019 12:58:31 -0400 X-Greylist: delayed 904 seconds by postgrey-1.27 at vger.kernel.org; Tue, 08 Oct 2019 12:58:30 EDT Received: from sc9-mailhost3.vmware.com (10.113.161.73) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Tue, 8 Oct 2019 09:43:23 -0700 Received: from akaher-lnx-dev.eng.vmware.com (unknown [10.110.19.203]) by sc9-mailhost3.vmware.com (Postfix) with ESMTP id 1624D40C43; Tue, 8 Oct 2019 09:43:20 -0700 (PDT) From: Ajay Kaher To: CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v2 0/8] Backported fixes for 4.4 stable tree Date: Wed, 9 Oct 2019 06:14:15 +0530 Message-ID: <1570581863-12090-1-git-send-email-akaher@vmware.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-001.vmware.com: akaher@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org These patches include few backported fixes for the 4.4 stable tree. I would appreciate if you could kindly consider including them in the next release. Ajay --- [Changes from v1]: No changes, only answering Greg's below queries: >> Why are these needed? From what I remember, the last patch here is only >> needed for machines that are "HUGE" and for those, you shouldn't be >> using 4.4.y anymore anyway, right? You just end up saving so much more >> speed and energy using a newer kernel, why would you want to waste it >> using an older one? >> >> So I need a really good reason why to accept these :) > > It's been a week, so I'm dropping this from my queue now. Please resend > with this information if you still want these in the tree. > thanks, > greg k-h Indeed, the machine needs to have about 140 GB of RAM to exploit this vulnerability (CVE-2019-11487). However, Photon OS doesn't impose any limits on the amount of RAM that it supports, so we would like to safeguard the kernel against this CVE. Also, while newer versions of Photon OS are on more recent kernels, Photon OS 1.0 uses the 4.4 stable series, so it would be great to get these patches included in an upcoming 4.4 stable release. We would also like to have the following patches that are for machines that are huge: Patch 1: Introduced page_ref_zero_or_close_to_overflow() which helps to check for small underflows (or _very_ close to overflowing), and ignore overflows which have strayed into negative territory. And this is being used inside get_page() and get_page_foll() to reduce the possibility of overflowing. Patch 6: Attacker could do direct IO on a page multiple times to trigger an overflowing. This patch makes get_user_pages() refuse to if there is an overflow. Patch 8: This removes another mechanism for overflowing the page refcount inside pipe_buf_get(). --- [PATCH v2 1/8]: Backporting of upstream commit f958d7b528b1: mm: make page ref count overflow check tighter and more explicit [PATCH v2 2/8]: Backporting of upstream commit 88b1a17dfc3e: mm: add 'try_get_page()' helper function [PATCH v2 3/8]: Backporting of upstream commit 7aef4172c795: mm: handle PTE-mapped tail pages in gerneric fast gup implementaiton [PATCH v2 4/8]: Backporting of upstream commit a3e328556d41: mm, gup: remove broken VM_BUG_ON_PAGE compound check for hugepages [PATCH v2 5/8]: Backporting of upstream commit d63206ee32b6: mm, gup: ensure real head page is ref-counted when using hugepages [PATCH v2 6/8]: Backporting of upstream commit 8fde12ca79af: mm: prevent get_user_pages() from overflowing page refcount [PATCH v2 7/8]: Backporting of upstream commit 7bf2d1df8082: pipe: add pipe_buf_get() helper [PATCH v2 8/8]: Backporting of upstream commit 15fab63e1e57: fs: prevent page refcount overflow in pipe_buf_get